signal.c 19 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758
  1. /*
  2. * linux/arch/arm/kernel/signal.c
  3. *
  4. * Copyright (C) 1995-2002 Russell King
  5. *
  6. * This program is free software; you can redistribute it and/or modify
  7. * it under the terms of the GNU General Public License version 2 as
  8. * published by the Free Software Foundation.
  9. */
  10. #include <linux/config.h>
  11. #include <linux/errno.h>
  12. #include <linux/signal.h>
  13. #include <linux/ptrace.h>
  14. #include <linux/personality.h>
  15. #include <asm/cacheflush.h>
  16. #include <asm/ucontext.h>
  17. #include <asm/uaccess.h>
  18. #include <asm/unistd.h>
  19. #include "ptrace.h"
  20. #include "signal.h"
  21. #define _BLOCKABLE (~(sigmask(SIGKILL) | sigmask(SIGSTOP)))
  22. /*
  23. * For ARM syscalls, we encode the syscall number into the instruction.
  24. */
  25. #define SWI_SYS_SIGRETURN (0xef000000|(__NR_sigreturn))
  26. #define SWI_SYS_RT_SIGRETURN (0xef000000|(__NR_rt_sigreturn))
  27. /*
  28. * For Thumb syscalls, we pass the syscall number via r7. We therefore
  29. * need two 16-bit instructions.
  30. */
  31. #define SWI_THUMB_SIGRETURN (0xdf00 << 16 | 0x2700 | (__NR_sigreturn - __NR_SYSCALL_BASE))
  32. #define SWI_THUMB_RT_SIGRETURN (0xdf00 << 16 | 0x2700 | (__NR_rt_sigreturn - __NR_SYSCALL_BASE))
  33. const unsigned long sigreturn_codes[4] = {
  34. SWI_SYS_SIGRETURN, SWI_THUMB_SIGRETURN,
  35. SWI_SYS_RT_SIGRETURN, SWI_THUMB_RT_SIGRETURN
  36. };
  37. static int do_signal(sigset_t *oldset, struct pt_regs * regs, int syscall);
  38. /*
  39. * atomically swap in the new signal mask, and wait for a signal.
  40. */
  41. asmlinkage int sys_sigsuspend(int restart, unsigned long oldmask, old_sigset_t mask, struct pt_regs *regs)
  42. {
  43. sigset_t saveset;
  44. mask &= _BLOCKABLE;
  45. spin_lock_irq(&current->sighand->siglock);
  46. saveset = current->blocked;
  47. siginitset(&current->blocked, mask);
  48. recalc_sigpending();
  49. spin_unlock_irq(&current->sighand->siglock);
  50. regs->ARM_r0 = -EINTR;
  51. while (1) {
  52. current->state = TASK_INTERRUPTIBLE;
  53. schedule();
  54. if (do_signal(&saveset, regs, 0))
  55. return regs->ARM_r0;
  56. }
  57. }
  58. asmlinkage int
  59. sys_rt_sigsuspend(sigset_t __user *unewset, size_t sigsetsize, struct pt_regs *regs)
  60. {
  61. sigset_t saveset, newset;
  62. /* XXX: Don't preclude handling different sized sigset_t's. */
  63. if (sigsetsize != sizeof(sigset_t))
  64. return -EINVAL;
  65. if (copy_from_user(&newset, unewset, sizeof(newset)))
  66. return -EFAULT;
  67. sigdelsetmask(&newset, ~_BLOCKABLE);
  68. spin_lock_irq(&current->sighand->siglock);
  69. saveset = current->blocked;
  70. current->blocked = newset;
  71. recalc_sigpending();
  72. spin_unlock_irq(&current->sighand->siglock);
  73. regs->ARM_r0 = -EINTR;
  74. while (1) {
  75. current->state = TASK_INTERRUPTIBLE;
  76. schedule();
  77. if (do_signal(&saveset, regs, 0))
  78. return regs->ARM_r0;
  79. }
  80. }
  81. asmlinkage int
  82. sys_sigaction(int sig, const struct old_sigaction __user *act,
  83. struct old_sigaction __user *oact)
  84. {
  85. struct k_sigaction new_ka, old_ka;
  86. int ret;
  87. if (act) {
  88. old_sigset_t mask;
  89. if (!access_ok(VERIFY_READ, act, sizeof(*act)) ||
  90. __get_user(new_ka.sa.sa_handler, &act->sa_handler) ||
  91. __get_user(new_ka.sa.sa_restorer, &act->sa_restorer))
  92. return -EFAULT;
  93. __get_user(new_ka.sa.sa_flags, &act->sa_flags);
  94. __get_user(mask, &act->sa_mask);
  95. siginitset(&new_ka.sa.sa_mask, mask);
  96. }
  97. ret = do_sigaction(sig, act ? &new_ka : NULL, oact ? &old_ka : NULL);
  98. if (!ret && oact) {
  99. if (!access_ok(VERIFY_WRITE, oact, sizeof(*oact)) ||
  100. __put_user(old_ka.sa.sa_handler, &oact->sa_handler) ||
  101. __put_user(old_ka.sa.sa_restorer, &oact->sa_restorer))
  102. return -EFAULT;
  103. __put_user(old_ka.sa.sa_flags, &oact->sa_flags);
  104. __put_user(old_ka.sa.sa_mask.sig[0], &oact->sa_mask);
  105. }
  106. return ret;
  107. }
  108. #ifdef CONFIG_IWMMXT
  109. /* iwmmxt_area is 0x98 bytes long, preceeded by 8 bytes of signature */
  110. #define IWMMXT_STORAGE_SIZE (0x98 + 8)
  111. #define IWMMXT_MAGIC0 0x12ef842a
  112. #define IWMMXT_MAGIC1 0x1c07ca71
  113. struct iwmmxt_sigframe {
  114. unsigned long magic0;
  115. unsigned long magic1;
  116. unsigned long storage[0x98/4];
  117. };
  118. static int page_present(struct mm_struct *mm, void __user *uptr, int wr)
  119. {
  120. unsigned long addr = (unsigned long)uptr;
  121. pgd_t *pgd = pgd_offset(mm, addr);
  122. if (pgd_present(*pgd)) {
  123. pmd_t *pmd = pmd_offset(pgd, addr);
  124. if (pmd_present(*pmd)) {
  125. pte_t *pte = pte_offset_map(pmd, addr);
  126. return (pte_present(*pte) && (!wr || pte_write(*pte)));
  127. }
  128. }
  129. return 0;
  130. }
  131. static int copy_locked(void __user *uptr, void *kptr, size_t size, int write,
  132. void (*copyfn)(void *, void __user *))
  133. {
  134. unsigned char v, __user *userptr = uptr;
  135. int err = 0;
  136. do {
  137. struct mm_struct *mm;
  138. if (write) {
  139. __put_user_error(0, userptr, err);
  140. __put_user_error(0, userptr + size - 1, err);
  141. } else {
  142. __get_user_error(v, userptr, err);
  143. __get_user_error(v, userptr + size - 1, err);
  144. }
  145. if (err)
  146. break;
  147. mm = current->mm;
  148. spin_lock(&mm->page_table_lock);
  149. if (page_present(mm, userptr, write) &&
  150. page_present(mm, userptr + size - 1, write)) {
  151. copyfn(kptr, uptr);
  152. } else
  153. err = 1;
  154. spin_unlock(&mm->page_table_lock);
  155. } while (err);
  156. return err;
  157. }
  158. static int preserve_iwmmxt_context(struct iwmmxt_sigframe *frame)
  159. {
  160. int err = 0;
  161. /* the iWMMXt context must be 64 bit aligned */
  162. WARN_ON((unsigned long)frame & 7);
  163. __put_user_error(IWMMXT_MAGIC0, &frame->magic0, err);
  164. __put_user_error(IWMMXT_MAGIC1, &frame->magic1, err);
  165. /*
  166. * iwmmxt_task_copy() doesn't check user permissions.
  167. * Let's do a dummy write on the upper boundary to ensure
  168. * access to user mem is OK all way up.
  169. */
  170. err |= copy_locked(&frame->storage, current_thread_info(),
  171. sizeof(frame->storage), 1, iwmmxt_task_copy);
  172. return err;
  173. }
  174. static int restore_iwmmxt_context(struct iwmmxt_sigframe *frame)
  175. {
  176. unsigned long magic0, magic1;
  177. int err = 0;
  178. /* the iWMMXt context is 64 bit aligned */
  179. WARN_ON((unsigned long)frame & 7);
  180. /*
  181. * Validate iWMMXt context signature.
  182. * Also, iwmmxt_task_restore() doesn't check user permissions.
  183. * Let's do a dummy write on the upper boundary to ensure
  184. * access to user mem is OK all way up.
  185. */
  186. __get_user_error(magic0, &frame->magic0, err);
  187. __get_user_error(magic1, &frame->magic1, err);
  188. if (!err && magic0 == IWMMXT_MAGIC0 && magic1 == IWMMXT_MAGIC1)
  189. err = copy_locked(&frame->storage, current_thread_info(),
  190. sizeof(frame->storage), 0, iwmmxt_task_restore);
  191. return err;
  192. }
  193. #endif
  194. /*
  195. * Auxiliary signal frame. This saves stuff like FP state.
  196. * The layout of this structure is not part of the user ABI.
  197. */
  198. struct aux_sigframe {
  199. #ifdef CONFIG_IWMMXT
  200. struct iwmmxt_sigframe iwmmxt;
  201. #endif
  202. #ifdef CONFIG_VFP
  203. union vfp_state vfp;
  204. #endif
  205. };
  206. /*
  207. * Do a signal return; undo the signal stack. These are aligned to 64-bit.
  208. */
  209. struct sigframe {
  210. struct sigcontext sc;
  211. unsigned long extramask[_NSIG_WORDS-1];
  212. unsigned long retcode;
  213. struct aux_sigframe aux __attribute__((aligned(8)));
  214. };
  215. struct rt_sigframe {
  216. struct siginfo __user *pinfo;
  217. void __user *puc;
  218. struct siginfo info;
  219. struct ucontext uc;
  220. unsigned long retcode;
  221. struct aux_sigframe aux __attribute__((aligned(8)));
  222. };
  223. static int
  224. restore_sigcontext(struct pt_regs *regs, struct sigcontext __user *sc,
  225. struct aux_sigframe __user *aux)
  226. {
  227. int err = 0;
  228. __get_user_error(regs->ARM_r0, &sc->arm_r0, err);
  229. __get_user_error(regs->ARM_r1, &sc->arm_r1, err);
  230. __get_user_error(regs->ARM_r2, &sc->arm_r2, err);
  231. __get_user_error(regs->ARM_r3, &sc->arm_r3, err);
  232. __get_user_error(regs->ARM_r4, &sc->arm_r4, err);
  233. __get_user_error(regs->ARM_r5, &sc->arm_r5, err);
  234. __get_user_error(regs->ARM_r6, &sc->arm_r6, err);
  235. __get_user_error(regs->ARM_r7, &sc->arm_r7, err);
  236. __get_user_error(regs->ARM_r8, &sc->arm_r8, err);
  237. __get_user_error(regs->ARM_r9, &sc->arm_r9, err);
  238. __get_user_error(regs->ARM_r10, &sc->arm_r10, err);
  239. __get_user_error(regs->ARM_fp, &sc->arm_fp, err);
  240. __get_user_error(regs->ARM_ip, &sc->arm_ip, err);
  241. __get_user_error(regs->ARM_sp, &sc->arm_sp, err);
  242. __get_user_error(regs->ARM_lr, &sc->arm_lr, err);
  243. __get_user_error(regs->ARM_pc, &sc->arm_pc, err);
  244. __get_user_error(regs->ARM_cpsr, &sc->arm_cpsr, err);
  245. err |= !valid_user_regs(regs);
  246. #ifdef CONFIG_IWMMXT
  247. if (err == 0 && test_thread_flag(TIF_USING_IWMMXT))
  248. err |= restore_iwmmxt_context(&aux->iwmmxt);
  249. #endif
  250. #ifdef CONFIG_VFP
  251. // if (err == 0)
  252. // err |= vfp_restore_state(&aux->vfp);
  253. #endif
  254. return err;
  255. }
  256. asmlinkage int sys_sigreturn(struct pt_regs *regs)
  257. {
  258. struct sigframe __user *frame;
  259. sigset_t set;
  260. /* Always make any pending restarted system calls return -EINTR */
  261. current_thread_info()->restart_block.fn = do_no_restart_syscall;
  262. /*
  263. * Since we stacked the signal on a 64-bit boundary,
  264. * then 'sp' should be word aligned here. If it's
  265. * not, then the user is trying to mess with us.
  266. */
  267. if (regs->ARM_sp & 7)
  268. goto badframe;
  269. frame = (struct sigframe __user *)regs->ARM_sp;
  270. if (!access_ok(VERIFY_READ, frame, sizeof (*frame)))
  271. goto badframe;
  272. if (__get_user(set.sig[0], &frame->sc.oldmask)
  273. || (_NSIG_WORDS > 1
  274. && __copy_from_user(&set.sig[1], &frame->extramask,
  275. sizeof(frame->extramask))))
  276. goto badframe;
  277. sigdelsetmask(&set, ~_BLOCKABLE);
  278. spin_lock_irq(&current->sighand->siglock);
  279. current->blocked = set;
  280. recalc_sigpending();
  281. spin_unlock_irq(&current->sighand->siglock);
  282. if (restore_sigcontext(regs, &frame->sc, &frame->aux))
  283. goto badframe;
  284. /* Send SIGTRAP if we're single-stepping */
  285. if (current->ptrace & PT_SINGLESTEP) {
  286. ptrace_cancel_bpt(current);
  287. send_sig(SIGTRAP, current, 1);
  288. }
  289. return regs->ARM_r0;
  290. badframe:
  291. force_sig(SIGSEGV, current);
  292. return 0;
  293. }
  294. asmlinkage int sys_rt_sigreturn(struct pt_regs *regs)
  295. {
  296. struct rt_sigframe __user *frame;
  297. sigset_t set;
  298. /* Always make any pending restarted system calls return -EINTR */
  299. current_thread_info()->restart_block.fn = do_no_restart_syscall;
  300. /*
  301. * Since we stacked the signal on a 64-bit boundary,
  302. * then 'sp' should be word aligned here. If it's
  303. * not, then the user is trying to mess with us.
  304. */
  305. if (regs->ARM_sp & 7)
  306. goto badframe;
  307. frame = (struct rt_sigframe __user *)regs->ARM_sp;
  308. if (!access_ok(VERIFY_READ, frame, sizeof (*frame)))
  309. goto badframe;
  310. if (__copy_from_user(&set, &frame->uc.uc_sigmask, sizeof(set)))
  311. goto badframe;
  312. sigdelsetmask(&set, ~_BLOCKABLE);
  313. spin_lock_irq(&current->sighand->siglock);
  314. current->blocked = set;
  315. recalc_sigpending();
  316. spin_unlock_irq(&current->sighand->siglock);
  317. if (restore_sigcontext(regs, &frame->uc.uc_mcontext, &frame->aux))
  318. goto badframe;
  319. if (do_sigaltstack(&frame->uc.uc_stack, NULL, regs->ARM_sp) == -EFAULT)
  320. goto badframe;
  321. /* Send SIGTRAP if we're single-stepping */
  322. if (current->ptrace & PT_SINGLESTEP) {
  323. ptrace_cancel_bpt(current);
  324. send_sig(SIGTRAP, current, 1);
  325. }
  326. return regs->ARM_r0;
  327. badframe:
  328. force_sig(SIGSEGV, current);
  329. return 0;
  330. }
  331. static int
  332. setup_sigcontext(struct sigcontext __user *sc, struct aux_sigframe __user *aux,
  333. struct pt_regs *regs, unsigned long mask)
  334. {
  335. int err = 0;
  336. __put_user_error(regs->ARM_r0, &sc->arm_r0, err);
  337. __put_user_error(regs->ARM_r1, &sc->arm_r1, err);
  338. __put_user_error(regs->ARM_r2, &sc->arm_r2, err);
  339. __put_user_error(regs->ARM_r3, &sc->arm_r3, err);
  340. __put_user_error(regs->ARM_r4, &sc->arm_r4, err);
  341. __put_user_error(regs->ARM_r5, &sc->arm_r5, err);
  342. __put_user_error(regs->ARM_r6, &sc->arm_r6, err);
  343. __put_user_error(regs->ARM_r7, &sc->arm_r7, err);
  344. __put_user_error(regs->ARM_r8, &sc->arm_r8, err);
  345. __put_user_error(regs->ARM_r9, &sc->arm_r9, err);
  346. __put_user_error(regs->ARM_r10, &sc->arm_r10, err);
  347. __put_user_error(regs->ARM_fp, &sc->arm_fp, err);
  348. __put_user_error(regs->ARM_ip, &sc->arm_ip, err);
  349. __put_user_error(regs->ARM_sp, &sc->arm_sp, err);
  350. __put_user_error(regs->ARM_lr, &sc->arm_lr, err);
  351. __put_user_error(regs->ARM_pc, &sc->arm_pc, err);
  352. __put_user_error(regs->ARM_cpsr, &sc->arm_cpsr, err);
  353. __put_user_error(current->thread.trap_no, &sc->trap_no, err);
  354. __put_user_error(current->thread.error_code, &sc->error_code, err);
  355. __put_user_error(current->thread.address, &sc->fault_address, err);
  356. __put_user_error(mask, &sc->oldmask, err);
  357. #ifdef CONFIG_IWMMXT
  358. if (err == 0 && test_thread_flag(TIF_USING_IWMMXT))
  359. err |= preserve_iwmmxt_context(&aux->iwmmxt);
  360. #endif
  361. #ifdef CONFIG_VFP
  362. // if (err == 0)
  363. // err |= vfp_save_state(&aux->vfp);
  364. #endif
  365. return err;
  366. }
  367. static inline void __user *
  368. get_sigframe(struct k_sigaction *ka, struct pt_regs *regs, int framesize)
  369. {
  370. unsigned long sp = regs->ARM_sp;
  371. void __user *frame;
  372. /*
  373. * This is the X/Open sanctioned signal stack switching.
  374. */
  375. if ((ka->sa.sa_flags & SA_ONSTACK) && !sas_ss_flags(sp))
  376. sp = current->sas_ss_sp + current->sas_ss_size;
  377. /*
  378. * ATPCS B01 mandates 8-byte alignment
  379. */
  380. frame = (void __user *)((sp - framesize) & ~7);
  381. /*
  382. * Check that we can actually write to the signal frame.
  383. */
  384. if (!access_ok(VERIFY_WRITE, frame, framesize))
  385. frame = NULL;
  386. return frame;
  387. }
  388. static int
  389. setup_return(struct pt_regs *regs, struct k_sigaction *ka,
  390. unsigned long __user *rc, void __user *frame, int usig)
  391. {
  392. unsigned long handler = (unsigned long)ka->sa.sa_handler;
  393. unsigned long retcode;
  394. int thumb = 0;
  395. unsigned long cpsr = regs->ARM_cpsr & ~PSR_f;
  396. /*
  397. * Maybe we need to deliver a 32-bit signal to a 26-bit task.
  398. */
  399. if (ka->sa.sa_flags & SA_THIRTYTWO)
  400. cpsr = (cpsr & ~MODE_MASK) | USR_MODE;
  401. #ifdef CONFIG_ARM_THUMB
  402. if (elf_hwcap & HWCAP_THUMB) {
  403. /*
  404. * The LSB of the handler determines if we're going to
  405. * be using THUMB or ARM mode for this signal handler.
  406. */
  407. thumb = handler & 1;
  408. if (thumb)
  409. cpsr |= PSR_T_BIT;
  410. else
  411. cpsr &= ~PSR_T_BIT;
  412. }
  413. #endif
  414. if (ka->sa.sa_flags & SA_RESTORER) {
  415. retcode = (unsigned long)ka->sa.sa_restorer;
  416. } else {
  417. unsigned int idx = thumb;
  418. if (ka->sa.sa_flags & SA_SIGINFO)
  419. idx += 2;
  420. if (__put_user(sigreturn_codes[idx], rc))
  421. return 1;
  422. if (cpsr & MODE32_BIT) {
  423. /*
  424. * 32-bit code can use the new high-page
  425. * signal return code support.
  426. */
  427. retcode = KERN_SIGRETURN_CODE + (idx << 2) + thumb;
  428. } else {
  429. /*
  430. * Ensure that the instruction cache sees
  431. * the return code written onto the stack.
  432. */
  433. flush_icache_range((unsigned long)rc,
  434. (unsigned long)(rc + 1));
  435. retcode = ((unsigned long)rc) + thumb;
  436. }
  437. }
  438. regs->ARM_r0 = usig;
  439. regs->ARM_sp = (unsigned long)frame;
  440. regs->ARM_lr = retcode;
  441. regs->ARM_pc = handler;
  442. regs->ARM_cpsr = cpsr;
  443. return 0;
  444. }
  445. static int
  446. setup_frame(int usig, struct k_sigaction *ka, sigset_t *set, struct pt_regs *regs)
  447. {
  448. struct sigframe __user *frame = get_sigframe(ka, regs, sizeof(*frame));
  449. int err = 0;
  450. if (!frame)
  451. return 1;
  452. err |= setup_sigcontext(&frame->sc, &frame->aux, regs, set->sig[0]);
  453. if (_NSIG_WORDS > 1) {
  454. err |= __copy_to_user(frame->extramask, &set->sig[1],
  455. sizeof(frame->extramask));
  456. }
  457. if (err == 0)
  458. err = setup_return(regs, ka, &frame->retcode, frame, usig);
  459. return err;
  460. }
  461. static int
  462. setup_rt_frame(int usig, struct k_sigaction *ka, siginfo_t *info,
  463. sigset_t *set, struct pt_regs *regs)
  464. {
  465. struct rt_sigframe __user *frame = get_sigframe(ka, regs, sizeof(*frame));
  466. stack_t stack;
  467. int err = 0;
  468. if (!frame)
  469. return 1;
  470. __put_user_error(&frame->info, &frame->pinfo, err);
  471. __put_user_error(&frame->uc, &frame->puc, err);
  472. err |= copy_siginfo_to_user(&frame->info, info);
  473. __put_user_error(0, &frame->uc.uc_flags, err);
  474. __put_user_error(NULL, &frame->uc.uc_link, err);
  475. memset(&stack, 0, sizeof(stack));
  476. stack.ss_sp = (void __user *)current->sas_ss_sp;
  477. stack.ss_flags = sas_ss_flags(regs->ARM_sp);
  478. stack.ss_size = current->sas_ss_size;
  479. err |= __copy_to_user(&frame->uc.uc_stack, &stack, sizeof(stack));
  480. err |= setup_sigcontext(&frame->uc.uc_mcontext, &frame->aux,
  481. regs, set->sig[0]);
  482. err |= __copy_to_user(&frame->uc.uc_sigmask, set, sizeof(*set));
  483. if (err == 0)
  484. err = setup_return(regs, ka, &frame->retcode, frame, usig);
  485. if (err == 0) {
  486. /*
  487. * For realtime signals we must also set the second and third
  488. * arguments for the signal handler.
  489. * -- Peter Maydell <pmaydell@chiark.greenend.org.uk> 2000-12-06
  490. */
  491. regs->ARM_r1 = (unsigned long)&frame->info;
  492. regs->ARM_r2 = (unsigned long)&frame->uc;
  493. }
  494. return err;
  495. }
  496. static inline void restart_syscall(struct pt_regs *regs)
  497. {
  498. regs->ARM_r0 = regs->ARM_ORIG_r0;
  499. regs->ARM_pc -= thumb_mode(regs) ? 2 : 4;
  500. }
  501. /*
  502. * OK, we're invoking a handler
  503. */
  504. static void
  505. handle_signal(unsigned long sig, struct k_sigaction *ka,
  506. siginfo_t *info, sigset_t *oldset,
  507. struct pt_regs * regs, int syscall)
  508. {
  509. struct thread_info *thread = current_thread_info();
  510. struct task_struct *tsk = current;
  511. int usig = sig;
  512. int ret;
  513. /*
  514. * If we were from a system call, check for system call restarting...
  515. */
  516. if (syscall) {
  517. switch (regs->ARM_r0) {
  518. case -ERESTART_RESTARTBLOCK:
  519. case -ERESTARTNOHAND:
  520. regs->ARM_r0 = -EINTR;
  521. break;
  522. case -ERESTARTSYS:
  523. if (!(ka->sa.sa_flags & SA_RESTART)) {
  524. regs->ARM_r0 = -EINTR;
  525. break;
  526. }
  527. /* fallthrough */
  528. case -ERESTARTNOINTR:
  529. restart_syscall(regs);
  530. }
  531. }
  532. /*
  533. * translate the signal
  534. */
  535. if (usig < 32 && thread->exec_domain && thread->exec_domain->signal_invmap)
  536. usig = thread->exec_domain->signal_invmap[usig];
  537. /*
  538. * Set up the stack frame
  539. */
  540. if (ka->sa.sa_flags & SA_SIGINFO)
  541. ret = setup_rt_frame(usig, ka, info, oldset, regs);
  542. else
  543. ret = setup_frame(usig, ka, oldset, regs);
  544. /*
  545. * Check that the resulting registers are actually sane.
  546. */
  547. ret |= !valid_user_regs(regs);
  548. /*
  549. * Block the signal if we were unsuccessful.
  550. */
  551. if (ret != 0) {
  552. spin_lock_irq(&tsk->sighand->siglock);
  553. sigorsets(&tsk->blocked, &tsk->blocked,
  554. &ka->sa.sa_mask);
  555. if (!(ka->sa.sa_flags & SA_NODEFER))
  556. sigaddset(&tsk->blocked, sig);
  557. recalc_sigpending();
  558. spin_unlock_irq(&tsk->sighand->siglock);
  559. }
  560. if (ret == 0)
  561. return;
  562. force_sigsegv(sig, tsk);
  563. }
  564. /*
  565. * Note that 'init' is a special process: it doesn't get signals it doesn't
  566. * want to handle. Thus you cannot kill init even with a SIGKILL even by
  567. * mistake.
  568. *
  569. * Note that we go through the signals twice: once to check the signals that
  570. * the kernel can handle, and then we build all the user-level signal handling
  571. * stack-frames in one go after that.
  572. */
  573. static int do_signal(sigset_t *oldset, struct pt_regs *regs, int syscall)
  574. {
  575. struct k_sigaction ka;
  576. siginfo_t info;
  577. int signr;
  578. /*
  579. * We want the common case to go fast, which
  580. * is why we may in certain cases get here from
  581. * kernel mode. Just return without doing anything
  582. * if so.
  583. */
  584. if (!user_mode(regs))
  585. return 0;
  586. if (try_to_freeze())
  587. goto no_signal;
  588. if (current->ptrace & PT_SINGLESTEP)
  589. ptrace_cancel_bpt(current);
  590. signr = get_signal_to_deliver(&info, &ka, regs, NULL);
  591. if (signr > 0) {
  592. handle_signal(signr, &ka, &info, oldset, regs, syscall);
  593. if (current->ptrace & PT_SINGLESTEP)
  594. ptrace_set_bpt(current);
  595. return 1;
  596. }
  597. no_signal:
  598. /*
  599. * No signal to deliver to the process - restart the syscall.
  600. */
  601. if (syscall) {
  602. if (regs->ARM_r0 == -ERESTART_RESTARTBLOCK) {
  603. if (thumb_mode(regs)) {
  604. regs->ARM_r7 = __NR_restart_syscall;
  605. regs->ARM_pc -= 2;
  606. } else {
  607. u32 __user *usp;
  608. regs->ARM_sp -= 12;
  609. usp = (u32 __user *)regs->ARM_sp;
  610. put_user(regs->ARM_pc, &usp[0]);
  611. /* swi __NR_restart_syscall */
  612. put_user(0xef000000 | __NR_restart_syscall, &usp[1]);
  613. /* ldr pc, [sp], #12 */
  614. put_user(0xe49df00c, &usp[2]);
  615. flush_icache_range((unsigned long)usp,
  616. (unsigned long)(usp + 3));
  617. regs->ARM_pc = regs->ARM_sp + 4;
  618. }
  619. }
  620. if (regs->ARM_r0 == -ERESTARTNOHAND ||
  621. regs->ARM_r0 == -ERESTARTSYS ||
  622. regs->ARM_r0 == -ERESTARTNOINTR) {
  623. restart_syscall(regs);
  624. }
  625. }
  626. if (current->ptrace & PT_SINGLESTEP)
  627. ptrace_set_bpt(current);
  628. return 0;
  629. }
  630. asmlinkage void
  631. do_notify_resume(struct pt_regs *regs, unsigned int thread_flags, int syscall)
  632. {
  633. if (thread_flags & _TIF_SIGPENDING)
  634. do_signal(&current->blocked, regs, syscall);
  635. }